index.adoc 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146
  1. [[oauth2client]]
  2. = OAuth 2.0 Client
  3. :page-section-summary-toc: 1
  4. The OAuth 2.0 Client features provide support for the Client role as defined in the https://tools.ietf.org/html/rfc6749#section-1.1[OAuth 2.0 Authorization Framework].
  5. At a high-level, the core features available are:
  6. .Authorization Grant support
  7. * https://tools.ietf.org/html/rfc6749#section-1.3.1[Authorization Code]
  8. * https://tools.ietf.org/html/rfc6749#section-6[Refresh Token]
  9. * https://tools.ietf.org/html/rfc6749#section-1.3.4[Client Credentials]
  10. * https://tools.ietf.org/html/rfc6749#section-1.3.3[Resource Owner Password Credentials]
  11. * https://datatracker.ietf.org/doc/html/rfc7523#section-2.1[JWT Bearer]
  12. .Client Authentication support
  13. * https://datatracker.ietf.org/doc/html/rfc7523#section-2.2[JWT Bearer]
  14. .HTTP Client support
  15. * xref:servlet/oauth2/client/authorized-clients.adoc#oauth2Client-webclient-servlet[`WebClient` integration for Servlet Environments] (for requesting protected resources)
  16. The `HttpSecurity.oauth2Client()` DSL provides a number of configuration options for customizing the core components used by OAuth 2.0 Client.
  17. In addition, `HttpSecurity.oauth2Client().authorizationCodeGrant()` enables the customization of the Authorization Code grant.
  18. The following code shows the complete configuration options provided by the `HttpSecurity.oauth2Client()` DSL:
  19. .OAuth2 Client Configuration Options
  20. ====
  21. .Java
  22. [source,java,role="primary"]
  23. ----
  24. @EnableWebSecurity
  25. public class OAuth2ClientSecurityConfig extends WebSecurityConfigurerAdapter {
  26. @Override
  27. protected void configure(HttpSecurity http) throws Exception {
  28. http
  29. .oauth2Client(oauth2 -> oauth2
  30. .clientRegistrationRepository(this.clientRegistrationRepository())
  31. .authorizedClientRepository(this.authorizedClientRepository())
  32. .authorizedClientService(this.authorizedClientService())
  33. .authorizationCodeGrant(codeGrant -> codeGrant
  34. .authorizationRequestRepository(this.authorizationRequestRepository())
  35. .authorizationRequestResolver(this.authorizationRequestResolver())
  36. .accessTokenResponseClient(this.accessTokenResponseClient())
  37. )
  38. );
  39. }
  40. }
  41. ----
  42. .Kotlin
  43. [source,kotlin,role="secondary"]
  44. ----
  45. @EnableWebSecurity
  46. class OAuth2ClientSecurityConfig : WebSecurityConfigurerAdapter() {
  47. override fun configure(http: HttpSecurity) {
  48. http {
  49. oauth2Client {
  50. clientRegistrationRepository = clientRegistrationRepository()
  51. authorizedClientRepository = authorizedClientRepository()
  52. authorizedClientService = authorizedClientService()
  53. authorizationCodeGrant {
  54. authorizationRequestRepository = authorizationRequestRepository()
  55. authorizationRequestResolver = authorizationRequestResolver()
  56. accessTokenResponseClient = accessTokenResponseClient()
  57. }
  58. }
  59. }
  60. }
  61. }
  62. ----
  63. ====
  64. In addition to the `HttpSecurity.oauth2Client()` DSL, XML configuration is also supported.
  65. The following code shows the complete configuration options available in the xref:servlet/appendix/namespace/http.adoc#nsa-oauth2-client[ security namespace]:
  66. .OAuth2 Client XML Configuration Options
  67. ====
  68. [source,xml]
  69. ----
  70. <http>
  71. <oauth2-client client-registration-repository-ref="clientRegistrationRepository"
  72. authorized-client-repository-ref="authorizedClientRepository"
  73. authorized-client-service-ref="authorizedClientService">
  74. <authorization-code-grant
  75. authorization-request-repository-ref="authorizationRequestRepository"
  76. authorization-request-resolver-ref="authorizationRequestResolver"
  77. access-token-response-client-ref="accessTokenResponseClient"/>
  78. </oauth2-client>
  79. </http>
  80. ----
  81. ====
  82. The `OAuth2AuthorizedClientManager` is responsible for managing the authorization (or re-authorization) of an OAuth 2.0 Client, in collaboration with one or more `OAuth2AuthorizedClientProvider`(s).
  83. The following code shows an example of how to register an `OAuth2AuthorizedClientManager` `@Bean` and associate it with an `OAuth2AuthorizedClientProvider` composite that provides support for the `authorization_code`, `refresh_token`, `client_credentials`, and `password` authorization grant types:
  84. ====
  85. .Java
  86. [source,java,role="primary"]
  87. ----
  88. @Bean
  89. public OAuth2AuthorizedClientManager authorizedClientManager(
  90. ClientRegistrationRepository clientRegistrationRepository,
  91. OAuth2AuthorizedClientRepository authorizedClientRepository) {
  92. OAuth2AuthorizedClientProvider authorizedClientProvider =
  93. OAuth2AuthorizedClientProviderBuilder.builder()
  94. .authorizationCode()
  95. .refreshToken()
  96. .clientCredentials()
  97. .password()
  98. .build();
  99. DefaultOAuth2AuthorizedClientManager authorizedClientManager =
  100. new DefaultOAuth2AuthorizedClientManager(
  101. clientRegistrationRepository, authorizedClientRepository);
  102. authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider);
  103. return authorizedClientManager;
  104. }
  105. ----
  106. .Kotlin
  107. [source,kotlin,role="secondary"]
  108. ----
  109. @Bean
  110. fun authorizedClientManager(
  111. clientRegistrationRepository: ClientRegistrationRepository,
  112. authorizedClientRepository: OAuth2AuthorizedClientRepository): OAuth2AuthorizedClientManager {
  113. val authorizedClientProvider: OAuth2AuthorizedClientProvider = OAuth2AuthorizedClientProviderBuilder.builder()
  114. .authorizationCode()
  115. .refreshToken()
  116. .clientCredentials()
  117. .password()
  118. .build()
  119. val authorizedClientManager = DefaultOAuth2AuthorizedClientManager(
  120. clientRegistrationRepository, authorizedClientRepository)
  121. authorizedClientManager.setAuthorizedClientProvider(authorizedClientProvider)
  122. return authorizedClientManager
  123. }
  124. ----
  125. ====